Certified Ethical Hacker (CEHv9) Questions and answers

31. Which of the following is a low-tech way of gaining unauthorized access to systems?

A. Eavesdropping

B. Scanning

C. Social engineering

D. Sniffing

D

32.A hacker has successfully infected an internet-facing server which he will then use to send junk mail,
take part in coordinated attacks, or host junk email content. Which sort of trojan infects this server?